Auth: Login incorrect: [maxx09/<no User-Password attribute>]

Sam T givemesam at gmail.com
Mon Mar 23 01:10:41 CET 2020


Thank you for that. Your right. I did not compile this freeradius server,
so im working with something that has been modded heavily. But i did get in
there, and add eap to authorize. that got it going. i loaded in eap.conf
with the right mods too (changed md5 to tls).
After reviewing the debug output, i think the router was sending the
password inside "EAP-Message" or somehow mschapv2 is coming in as
EAP-message? OR mikrotik is trying to pull a client cert from radius. im
not sure....

this is after putting eap in authorize, and modding the eap.conf to point
to the certs and md5>tls

my desired goal is to get user/pass to work through EAP, with no client
certs. im not sure it is possible, but each reply i get from you, and then
research more, gets me a few steps closer. i also wrote mikrotik to see if
their setup is passing the password through EAP message, or their ignoring
it, and the EAP-radius is designed for cert only, no passwords. but maybe
you can tell when looking at the cert error below.

Found Auth-Type = EAP
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!! Replacing User-Password in config items with Cleartext-Password. !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!! Please update your configuration so that the "known good" !!!
!!! clear text password is in Cleartext-Password, and not in User-Password.
!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

   1. Executing group from file /etc/freeradius/sites-enabled/server01.rad
   +- entering group authenticate {...}

   [eap] Request found, released from the list
   [eap] EAP/tls
   [eap] processing type tls
   [tls] Authenticate
   [tls] processing EAP-TLS
   TLS Length 141
   [tls] Length Included
   [tls] eaptls_verify returned 11
   [tls] <<< TLS 1.0 Handshake [length 0007], Certificate
   [tls] >>> TLS 1.0 Alert [length 0002], fatal handshake_failure
   TLS Alert write:fatal:handshake failure
   TLS_accept: error in SSLv3 read client certificate B
   rlm_eap: SSL error error:140890C7:SSL
   routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
   SSL: SSL_read failed in a system call (-1), TLS session fails.
   TLS receive handshake failed during operation
   [tls] eaptls_process returned 4
   [eap] Handler failed in EAP/tls
   [eap] Failed in EAP select
   ++[eap] returns invalid
   Failed to authenticate the user.
   Login incorrect (TLS Alert write:fatal:handshake failure): [maxx09/<via
   Auth-Type = EAP>] (from client wificpa port 0 cli 44.55.66.77)


On Sun, Mar 22, 2020 at 12:55 PM Alan DeKok <aland at deployingradius.com>
wrote:

> On Mar 22, 2020, at 1:07 PM, Sam T <givemesam at gmail.com> wrote:
> >
> > What you are trying to do: Get radius to work with mikrotik ikev2
> > authorization / client has self signed CA cert, Server has signed server
> +
> > CA cert
> >
> >   - why you are trying to do it: to add ikev2 radius auth while also
> >   supporting wifi authorization (which is working great)
> >   - what you expect the server to do: to accept user pass from mikrotik,
> >   and provide authorization reply w/ radreply attributes
> >   - what the server does instead (i.e. debug output). see output
> >
> > (my previous submission ran freeradius -X on top of a running server,
> this
> > time i followed the instructions, here is 1 clean process of the ikev2
> > request)
> >
> > rad_recv: Access-Request packet from host 45.63.66.220 port 40641, id=66,
> > length=143
> > User-Name = "maxx09"
> > Called-Station-Id = "444.555.666.777"
> > Calling-Station-Id = "222.333.444.555"
> > NAS-Port-Id = "\000\000\000\r"
> > NAS-Port-Type = Virtual
> > Service-Type = Framed-User
> > Event-Timestamp = "Mar 22 2020 16:54:39 UTC"
> > Framed-MTU = 1400
> > EAP-Message = 0x0200000b016d6178783039
>
>   It's EAP, which means that there is likely no User-Password *ever* in
> the request.
>
> >
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > !!!    Replacing User-Password in config items with Cleartext-Password.
> > !!!
> >
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > !!! Please update your configuration so that the "known good"
> > !!!
> > !!! clear text password is in Cleartext-Password, and not in
> User-Password.
> > !!!
>
>   Please follow that advice.  The "known good" password should be in
> Cleartext-Password.  Putting it into User-Password has been deprecated for
> 15+ years.
>
> > Cannot perform authentication.
> > Failed to authenticate the user.
>
>   Because the user is doing EAP, and you deleted the "eap" module from the
> "authorize" section.
>
>   The default configuration works.  Start with that, and make small
> changes, in order to get what you want.
>
>   If you delete massive amounts of things from the default configuration,
> you are very likely to break something.  As has been done here.
>
>   The EAP module does EAP authentication.  You MUST configure the EAP
> module in order for this to work.
>
>   Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html


More information about the Freeradius-Users mailing list